CN107679417A - A kind of method and system of user's operating right management - Google Patents

A kind of method and system of user's operating right management Download PDF

Info

Publication number
CN107679417A
CN107679417A CN201710930003.9A CN201710930003A CN107679417A CN 107679417 A CN107679417 A CN 107679417A CN 201710930003 A CN201710930003 A CN 201710930003A CN 107679417 A CN107679417 A CN 107679417A
Authority
CN
China
Prior art keywords
user
function
role
user role
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710930003.9A
Other languages
Chinese (zh)
Other versions
CN107679417B (en
Inventor
张建刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710930003.9A priority Critical patent/CN107679417B/en
Publication of CN107679417A publication Critical patent/CN107679417A/en
Application granted granted Critical
Publication of CN107679417B publication Critical patent/CN107679417B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

Method, system and the relevant apparatus of a kind of user's operating right management provided herein, methods described include:When receiving login instruction, obtain and log in user role corresponding to instruction;The self-defined constant logged in instruction is read, obtains functional role permissions list;Wherein, the list of functional role permissions list corresponding function authority credentials between each function items and user role;User role is compared with functional role permissions list, obtains function privilege set corresponding to user role;Determine that logging in instruction allows the function items of operation according to function privilege set.The associated rights data of user role is deposited in the form of self-defined constant, and deposited the configuration limits of function items as attribute, so when user logs in, the judgement of function privilege is carried out to user role, obtaining the user role allows the function items set of operation, and then its operating right is managed.

Description

A kind of method and system of user's operating right management
Technical field
The application is related to field of storage, more particularly to a kind of method, the system of the management of user's operating right, and a kind of meter Calculation machine storage medium and a kind of terminal.
Background technology
Under current techniques, the management of user role authority is mostly on the basis of user, and no role is distributed for user, And then distribute different function privilege operations.By configuring the role of user, when users log on, its role is obtained by user Authority, and then obtain the function privilege that active user can operate.When for user's distribution function when, it is typically complete with one Function be unit, hide or distribute to user, current functional unit can not be split again.Checked as domestic consumer only has Authority, in the current page, to check that operation for function distinguishing, is divided into M subfunctions and N subfunctions, no again in look facility Limitation of the domestic consumer to M and N functions can further be limited.
From function realization, the realization of current many technologies is the role that configured in advance completes user, is reconfigured at role couple The function privilege answered, the data of configuration can also be in the json configuration files in service end in database side.Stepped in user When recording system, service end reads the configuration of user, obtains function privilege corresponding to currently logged on user, and then load different Function.
When existing application of function is when in storage, in storage system, if one database of installation preserves the power of user Limit configuration, to a certain extent database not only occupy the system resource of storage as just the medium of storage user right, It is and inconsistent with the management software framework (not needing database) of former storage system.The equipment as data storage is stored, all It is that the data interaction for completing front and back end is ordered by CLI (Command Language Interface, Command Line Interface), if User right configuration is preserved using configuration file, then read-write of deposit position and file of configuration file etc., which will also result in, is The decline for performance of uniting.
In order to GUI (Graphical User Interface, computer operation user interface) management software framework phase Fusion, and H.D high responsiveness energy is carried, such as why not user right data are stored in DBAS, by right The access of database obtains configuration data, also user right data is not deposited by using the form of configuration file, by text The read-write of part obtains configuration data, is that the application needs to solve the problems, such as.
Apply for content
The purpose of the application is to provide a kind of method, system and the relevant apparatus of the management of user's operating right, solves existing Having needs in technology by accessing database or reading the problem of configuration file is to obtain user's corresponding configuration data.
In order to solve the above technical problems, the application provides a kind of method of user's operating right management, technical scheme is as follows:
When receiving login instruction, user role corresponding to the login instruction is obtained;
The self-defined constant logged in instruction is read, obtains functional role permissions list;Wherein, the functional role The list of permissions list corresponding function authority credentials between each function items and user role;
The user role is compared with the functional role permissions list, obtains work(corresponding to the user role Can authority set;
The function items for logging in instruction and allowing to operate are determined according to the function privilege set.
Wherein, before the user right is compared with functional role permissions list, in addition to:
In the DOM element of each function items, permission attributes are set up;
The function privilege value of the permission attributes is configured, generates the functional role permissions list.
Wherein, after reading the self-defined constant in the login instruction to obtain corresponding user role, in addition to:
The information of the user role is stored in Session objects.
Wherein, the user role is compared with the functional role permissions list, obtains the user role pair The function privilege set answered includes:
The functional role permissions list is traveled through, judges that the user role whether there is and is weighed in function corresponding to function items In limit value;
If in the presence of by the function items write-in function privilege set.
The application also provides a kind of system of user's operating right management, including:
Acquisition module, when logging in instruction for receiving, obtain user role corresponding to the login instruction;
Read module, for reading the self-defined constant logged in instruction, obtain functional role permissions list;Its In, the list of functional role permissions list corresponding function authority credentials between each function items and user role;
Comparing module, for the user role to be compared with the functional role permissions list, obtain the use Function privilege set corresponding to the role of family;
Determining module, for determining the function items for logging in instruction and allowing to operate according to the function privilege set.
Wherein, the system also includes:
Setup module, in the DOM element of each function items, setting up permission attributes;
Configuration module, for configuring the function privilege value of the permission attributes, generate the functional role Permissions list.
Wherein, the system also includes:
Memory module, for the information of the user role to be stored in Session objects.
Wherein, the comparing module includes:
Judging unit, for traveling through the functional role permissions list, judge that the user role whether there is in function In function privilege value corresponding to;
Writing unit, when being present in for the user role in function privilege value corresponding to function items, by the function Item writes the function privilege set.
The application also provides a kind of computer-readable recording medium, is stored thereon with computer program, the computer journey Following steps are realized when sequence is performed:
When receiving login instruction, user role corresponding to the login instruction is obtained;
The self-defined constant logged in instruction is read, obtains functional role permissions list;Wherein, the functional role The list of permissions list corresponding function authority credentials between each function items and user role;
The user role is compared with the functional role permissions list, obtains work(corresponding to the user role Can authority set;
The function items for logging in instruction and allowing to operate are determined according to the function privilege set.
The application also provides a kind of terminal, including memory and processor, has computer program in the memory, institute State when processor calls the computer program in the memory and realize following steps:
When receiving login instruction, user role corresponding to the login instruction is obtained;
The self-defined constant logged in instruction is read, obtains functional role permissions list;Wherein, the functional role The list of permissions list corresponding function authority credentials between each function items and user role;
The user role is compared with the functional role permissions list, obtains work(corresponding to the user role Can authority set;
The function items for logging in instruction and allowing to operate are determined according to the function privilege set.
Method, system and the relevant apparatus of a kind of user's operating right management provided herein, methods described include: When receiving login instruction, obtain and log in user role corresponding to instruction;The self-defined constant logged in instruction is read, obtains work( Can role-security list;Wherein, functional role permissions list corresponding function authority credentials between each function items and user role List;User role is compared with functional role permissions list, obtains function privilege set corresponding to user role;According to Function privilege set determines that logging in instruction allows the function items of operation.The phase of user role is deposited in the form of self-defined constant Permissions data is closed, and is deposited the configuration limits of function items as attribute, so when user logs in, user role is carried out The judgement of function privilege, obtaining the user role allows the function items set of operation, and then its operating right is managed.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of application, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
A kind of flow chart of the method for user's operating right management that Fig. 1 is provided by the embodiment of the present application;
The flow chart of the method for another user's operating right management that Fig. 2 is provided by the embodiment of the present application;
A kind of system structure diagram for user's operating right management that Fig. 3 is provided by the embodiment of the present application.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belong to the scope of the application protection.
It refer to Fig. 1, a kind of flow of the method for user's operating right management that Fig. 1 is provided by the embodiment of the present application Figure, concrete technical scheme are as follows:
S101:When receiving login instruction, user role corresponding to the login instruction is obtained;
When there is user's login, that is, when receiving login instruction, the user role according to corresponding to obtaining login instruction.Cause There may be multiple user roles for same user, but the log-on message of each user role is unique, passes through log-on message It is also unique that instruction is logged in during login, therefore is the user role according to corresponding to obtaining login instruction, and can not obtain user Corresponding user role.The identity of user, and its exercisable function privilege etc. are not limited herein.Each user role is corresponding User right be unique, but different user roles can correspond to same user right, such as user 1 and user 2 User right first can be corresponded to simultaneously.
It is pointed out that the user role has its corresponding user right, also within the scope of the acquisition of this step.Cause This is in systems, if it is that user right determines according to corresponding to user role to have access operating right.
Therefore, this step is intended to obtain user corresponding to the user role and the user role corresponding with logging in instruction Authority.
It is noted that after getting user role, the information of user role can also be stored in Session objects In.Session objects are in java engineerings, and the object of front end and service end interaction, user can customize to deposit into Session Data, and in the jsp pages, quote session, obtain data therein;Session presence services end, life cycle is once Session.Other, which can certainly be stored in, is beneficial in the object of the application operation, is not construed as limiting herein.
S102:The self-defined constant logged in instruction is read, obtains functional role permissions list;
Wherein, the row of functional role permissions list corresponding function authority credentials between each function items and user role Table.Because being that the data of configuration are stored in database or are stored in json configuration files in the prior art, this just needs and number A series of information exchange is carried out according to storehouse or reads configuration file.And the application is then with self-defined normal by related configuration data The form storage of amount.
Self-defined constant, exactly in order to realize this function, a variable of our oneself definition, and start in service When, it has been this variable assignments, as constant.Related to this, also a global constant, global constant are as current After service starts up, follow-up any operation is all without the data value in change current variable.This self-defined constant can Directly in the code of front end, to define a constant, what is deposited is functional role permissions list corresponding to current function items.It is excellent Choosing, this constant can be self-defined global constant, because functional role permissions list corresponding to each function items generally exists It will not easily change after setting, be operated in actual use according to this functional role permissions list.It may be noted that , functional role permissions list be not meant to its existence form can only in the form of a list, as long as function items can be embodied The form of expression of corresponding relation between user right, all should be in the protection domain of the application.Constant on definition Content and form, it should be configured, be not limited thereto according to actual conditions by those skilled in the art.
Referring to table 1, table 1 is a kind of specific functional role permissions list.It is it should be noted that clear in order to state in table Chu, the relation between function items A, B, C, D and user right first, second, third, fourth, penta is embodied with true or false, True, which represents the function items, allows the user right of operation, and false represents the user right of the function items quiescing.Such as work( Energy item A allows the user right of operation to be first, second and third.The table is intended merely to embody the pass between function items and user right System, in the presence of reality is in the form of constant, the code of A={ " first ", " second ", " third " } this aggregate form can be analogous to, The user right for not having corresponding relation with function items can be deleted.On the basis of function privilege, corresponding is user role number According to can be deposited in the form of one-to-many.In practical application, generally each function items individually have one to allow to operate corresponding to it Functional role permissions list.
In the application, user right can be specific to some specific function in current page.In the design of the page, pin To in DOM (Document Object Model, DOM Document Object Model) element of each function items, increasing permission category newly Property, by configuring the value values of permission attributes, i.e. function privilege value.Renaming as there is editor to roll up in the page operates, Permission functional configuration is configurable to permission=" vdiskEdit ", shows what current DOM element provided Function only has the role with vdiskEdit function privileges to be operated.
The functional role permissions list of table 1
It should be noted that function items herein can be the subfunction item for more refining to obtain to original function, example M functions and N functions as mentioned in the background art can be used as One function item.
S103:The user role is compared with the functional role permissions list, obtains the user role pair The function privilege set answered;
Before this step, the corresponding relation between user role and user right, function items and user are had existed for Corresponding relation (these are all by self-defined constant definition certainly) between authority, therefore can be closed by above-mentioned two is corresponding System obtains the corresponding relation between function items and user role, convenient for statement, referred to as corresponding relation X.Now, will need to only step on User role corresponding to record instruction is compared with corresponding relation X, you can obtains allowing operation corresponding to the user role Function privilege set.The login instructs the obtained function with operating right according to being in the set.It should be noted that Corresponding relation X can be by XA、XB、XCThe collective combinations that user role is corresponded to etc. each function items form.Now, X need to be traveled throughA、XB、 XCEtc. each set, function privilege set is obtained.
Preferably, the embodiment of the step can be:
The functional role permissions list is traveled through, judges that the user role whether there is and is weighed in function corresponding to function items In limit value;If in the presence of by the function items write-in function privilege set.
Function privilege value is not a value, is actually the set array of a user role.The meaning of write-in will permit Perhaps the function items operated are added in function privilege set, and specific writing mode is not construed as limiting.
S104:The function items for logging in instruction and allowing to operate are determined according to the function privilege set.
After obtaining function privilege set, displaying or the operational circumstances of each function items can be designed according to the set.Work as user When role is not present, such as in the absence of XAWhen middle, illustrate no operating right, function items corresponding to current DOM element can be set For that can not click on or hide function items corresponding to the DOM element.
The embodiment of the present application provides a kind of method of user's operating right management, and can be realized by the above method will power Limit on application configuration function items, avoid installation database either configuration file storage configuration data, while saved storage The memory space of equipment in itself, also improve the configuration performance of user right.
Based on above-described embodiment, the present embodiment provides a kind of method of more detailed user's operating right management, specific skill Art scheme is as follows:
S201:When receiving login instruction, user role corresponding to the login instruction is obtained;
S202:The self-defined constant logged in instruction is read, obtains functional role permissions list;
S203:The functional role permissions list is traveled through, judges that the user role whether there is in corresponding to function items In function privilege value;If so, into step S204;If it is not, into step 205;
S204:The function items are write into the function privilege set;Then into step S206;
S205:Hide the function items;
S206:The function items for logging in instruction and allowing to operate are determined according to the function privilege set.
A kind of system of the user's operating right management provided below the embodiment of the present application is introduced, described below System and the method for above-described user's operating right management can be mutually to should refer to.
Referring to Fig. 3, a kind of system architecture signal for user's operating right management that Fig. 3 is provided by the embodiment of the present application Figure, the system can include:
Acquisition module 100, when logging in instruction for receiving, obtain user role corresponding to the login instruction;
Read module 200, for reading the self-defined constant logged in instruction, obtain functional role permissions list; Wherein, the list of functional role permissions list corresponding function authority credentials between each function items and user role;
Comparing module 300, for the user role to be compared with the functional role permissions list, obtain described Function privilege set corresponding to user role;
Determining module 400, for determining the function items for logging in instruction and allowing to operate according to the function privilege set.
Based on above-described embodiment, as preferred embodiment, the system can also include:
Setup module, in the DOM element of each function items, setting up permission attributes;
Configuration module, for configuring the function privilege value of the permission attributes, generate the functional role Permissions list.
Based on above-described embodiment, as preferred embodiment, the system can also include:
Memory module, for the information of the user role to be stored in Session objects.
Based on above-described embodiment, as preferred embodiment, the comparing module can include:
Judging unit, for traveling through the functional role permissions list, judge that the user role whether there is in function In function privilege value corresponding to;
Writing unit, when being present in for the user role in function privilege value corresponding to function items, by the function Item writes the function privilege set.
Present invention also provides a kind of computer-readable recording medium, there is computer program thereon, the computer program The step of above-described embodiment provides can be realized when being performed.The storage medium can be:USB flash disk, mobile hard disk, read-only storage Device (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or light Disk etc. is various can be with the medium of store program codes.
Present invention also provides a kind of terminal, can include memory and processor, have computer in the memory Program, when the processor calls the computer program in the memory, it is possible to achieve the step of above-described embodiment provides. Certain terminal can also include the component such as various network interfaces, power supply.
Each embodiment is described by the way of progressive in specification, and what each embodiment stressed is and other realities Apply the difference of example, between each embodiment identical similar portion mutually referring to.For embodiment provide system and Speech, because it is corresponding with the method that embodiment provides, so description is fairly simple, related part is referring to method part illustration .
Method, system and the relevant apparatus of a kind of user's operating right management provided herein have been carried out in detail above It is thin to introduce.Specific case used herein is set forth to the principle and embodiment of the application, and above example is said It is bright to be only intended to help and understand the present processes and its core concept.It should be pointed out that the ordinary skill for the art For personnel, on the premise of the application principle is not departed from, some improvement and modification, these improvement can also be carried out to the application Also fallen into modification in the application scope of the claims.
It should also be noted that, in this manual, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except other identical element in the process including the key element, method, article or equipment being also present.

Claims (10)

  1. A kind of 1. method of user's operating right management, it is characterised in that including:
    When receiving login instruction, user role corresponding to the login instruction is obtained;
    The self-defined constant logged in instruction is read, obtains functional role permissions list;Wherein, the functional role authority The list of list corresponding function authority credentials between each function items and user role;
    The user role is compared with the functional role permissions list, function corresponding to the user role is obtained and weighs Limit set;
    The function items for logging in instruction and allowing to operate are determined according to the function privilege set.
  2. 2. according to the method for claim 1, it is characterised in that carry out the user right and functional role permissions list Before comparison, in addition to:
    In the DOM element of each function items, permission attributes are set up;
    The function privilege value of the permission attributes is configured, generates the functional role permissions list.
  3. 3. according to the method for claim 2, it is characterised in that read the self-defined constant in the login instruction to obtain After corresponding user role, in addition to:
    The information of the user role is stored in Session objects.
  4. 4. according to the method for claim 3, it is characterised in that by the user role and the functional role permissions list It is compared, obtaining function privilege set corresponding to the user role includes:
    The functional role permissions list is traveled through, judges that the user role whether there is in function privilege value corresponding to function items In;
    If in the presence of by the function items write-in function privilege set.
  5. A kind of 5. system of user's operating right management, it is characterised in that including:
    Acquisition module, when logging in instruction for receiving, obtain user role corresponding to the login instruction;
    Read module, for reading the self-defined constant logged in instruction, obtain functional role permissions list;Wherein, institute State the list of functional role permissions list corresponding function authority credentials between each function items and user role;
    Comparing module, for the user role to be compared with the functional role permissions list, obtain the user angle Function privilege set corresponding to color;
    Determining module, for determining the function items for logging in instruction and allowing to operate according to the function privilege set.
  6. 6. system according to claim 5, it is characterised in that also include:
    Setup module, in the DOM element of each function items, setting up permission attributes;
    Configuration module, for configuring the function privilege value of the permission attributes, generate the functional role authority List.
  7. 7. system according to claim 6, it is characterised in that also include:
    Memory module, for the information of the user role to be stored in Session objects.
  8. 8. system according to claim 7, it is characterised in that the comparing module includes:
    Judging unit, for traveling through the functional role permissions list, judge that the user role whether there is in function items pair In the function privilege value answered;
    Writing unit, when being present in for the user role in function privilege value corresponding to function items, the function items are write Enter the function privilege set.
  9. 9. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program quilt The method as described in claim any one of 1-4 is realized during execution.
  10. A kind of 10. terminal, it is characterised in that including memory and processor, there is computer program in the memory, it is described Processor realizes the method as described in claim any one of 1-4 when calling the computer program in the memory.
CN201710930003.9A 2017-10-09 2017-10-09 Method and system for managing user operation authority Active CN107679417B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710930003.9A CN107679417B (en) 2017-10-09 2017-10-09 Method and system for managing user operation authority

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710930003.9A CN107679417B (en) 2017-10-09 2017-10-09 Method and system for managing user operation authority

Publications (2)

Publication Number Publication Date
CN107679417A true CN107679417A (en) 2018-02-09
CN107679417B CN107679417B (en) 2021-01-12

Family

ID=61139286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710930003.9A Active CN107679417B (en) 2017-10-09 2017-10-09 Method and system for managing user operation authority

Country Status (1)

Country Link
CN (1) CN107679417B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108804946A (en) * 2018-06-12 2018-11-13 成都优易数据有限公司 A kind of table button authority control method based on Vue.js
CN109284602A (en) * 2018-09-13 2019-01-29 广东电网有限责任公司 A kind of authority configuring method and system
CN109669864A (en) * 2018-12-05 2019-04-23 郑州云海信息技术有限公司 A kind of authority control method and device based on test and management
CN110334541A (en) * 2019-06-14 2019-10-15 平安科技(深圳)有限公司 A kind of method and relevant apparatus of system administration
CN110995699A (en) * 2019-11-29 2020-04-10 云深互联(北京)科技有限公司 Unified management and control method, management and control end, client and equipment for network security
WO2020097863A1 (en) * 2018-11-15 2020-05-22 深圳市欢太科技有限公司 Flashing control method, flashing control apparatus and terminal device
WO2020233039A1 (en) * 2019-05-22 2020-11-26 深圳壹账通智能科技有限公司 User operation permission control method and apparatus, device, and medium
CN112596711A (en) * 2020-12-24 2021-04-02 福建升腾资讯有限公司 Personalized authority management setting method and system based on Web system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1967560A (en) * 2006-11-09 2007-05-23 华为技术有限公司 Controlling method of business operations competence and generating method of relational database
CN101441688A (en) * 2007-11-20 2009-05-27 阿里巴巴集团控股有限公司 User authority allocation method and user authority control method
US20100235885A1 (en) * 2009-03-11 2010-09-16 Jan Patrik Persson Secure Client-Side Aggregation of Web Applications
CN102467642A (en) * 2010-11-17 2012-05-23 北大方正集团有限公司 Permission control method and device for application software
CN103020498A (en) * 2012-11-19 2013-04-03 广东亚仿科技股份有限公司 Intelligent dynamic access control method and system
CN103324470A (en) * 2012-03-21 2013-09-25 阿里巴巴集团控股有限公司 Web system generation method and device
US20150358331A1 (en) * 2014-06-10 2015-12-10 Verizon Patent And Licensing Inc. Identity management, authorization and entitlement framework
CN106650414A (en) * 2016-12-28 2017-05-10 广州杰赛科技股份有限公司 User authority management method and system
CN107180192A (en) * 2017-05-09 2017-09-19 北京理工大学 Android malicious application detection method and system based on multi-feature fusion

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1967560A (en) * 2006-11-09 2007-05-23 华为技术有限公司 Controlling method of business operations competence and generating method of relational database
CN101441688A (en) * 2007-11-20 2009-05-27 阿里巴巴集团控股有限公司 User authority allocation method and user authority control method
US20100235885A1 (en) * 2009-03-11 2010-09-16 Jan Patrik Persson Secure Client-Side Aggregation of Web Applications
CN102467642A (en) * 2010-11-17 2012-05-23 北大方正集团有限公司 Permission control method and device for application software
CN103324470A (en) * 2012-03-21 2013-09-25 阿里巴巴集团控股有限公司 Web system generation method and device
CN103020498A (en) * 2012-11-19 2013-04-03 广东亚仿科技股份有限公司 Intelligent dynamic access control method and system
US20150358331A1 (en) * 2014-06-10 2015-12-10 Verizon Patent And Licensing Inc. Identity management, authorization and entitlement framework
CN106650414A (en) * 2016-12-28 2017-05-10 广州杰赛科技股份有限公司 User authority management method and system
CN107180192A (en) * 2017-05-09 2017-09-19 北京理工大学 Android malicious application detection method and system based on multi-feature fusion

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108804946A (en) * 2018-06-12 2018-11-13 成都优易数据有限公司 A kind of table button authority control method based on Vue.js
CN109284602A (en) * 2018-09-13 2019-01-29 广东电网有限责任公司 A kind of authority configuring method and system
WO2020097863A1 (en) * 2018-11-15 2020-05-22 深圳市欢太科技有限公司 Flashing control method, flashing control apparatus and terminal device
CN112654964A (en) * 2018-11-15 2021-04-13 深圳市欢太科技有限公司 Brush machine control method, brush machine control device and terminal equipment
CN109669864A (en) * 2018-12-05 2019-04-23 郑州云海信息技术有限公司 A kind of authority control method and device based on test and management
WO2020233039A1 (en) * 2019-05-22 2020-11-26 深圳壹账通智能科技有限公司 User operation permission control method and apparatus, device, and medium
CN110334541A (en) * 2019-06-14 2019-10-15 平安科技(深圳)有限公司 A kind of method and relevant apparatus of system administration
CN110334541B (en) * 2019-06-14 2024-03-01 平安科技(深圳)有限公司 System management method and related device
CN110995699A (en) * 2019-11-29 2020-04-10 云深互联(北京)科技有限公司 Unified management and control method, management and control end, client and equipment for network security
CN112596711A (en) * 2020-12-24 2021-04-02 福建升腾资讯有限公司 Personalized authority management setting method and system based on Web system

Also Published As

Publication number Publication date
CN107679417B (en) 2021-01-12

Similar Documents

Publication Publication Date Title
CN107679417A (en) A kind of method and system of user's operating right management
US10114964B2 (en) Role-based content rendering
US9805209B2 (en) Systems and methodologies for managing document access permissions
CN110569657B (en) Data access method, device, equipment and storage medium
CN110443010A (en) One kind permission visual configuration control method, device, terminal and storage medium in information system
US10740286B1 (en) Migration task validation before data migration
US20130311631A1 (en) Integrated cloud data center management
CN104951527A (en) System and method for rapid configuration of database management background
US11416630B1 (en) User programmatic interface for supporting data access control in a database system
CN110489994B (en) File authority management method and device for nuclear power station and terminal equipment
CN105184145A (en) Permission management method and management apparatus
US20200233907A1 (en) Location-based file recommendations for managed devices
CN105207989B (en) A kind of work system and its control method of various dimensions user
CN114817901A (en) Authority management method, related device and medium
CN108009444A (en) Authority control method, device and the computer-readable recording medium of full-text search
CN111241107A (en) Service processing method, device, medium and electronic equipment
US9904452B2 (en) Building user specific user interface instances
US10169055B2 (en) Access identifiers for graphical user interface elements
Chaganti et al. Amazon SimpleDB developer guide
CN103809947A (en) Automatic release method and system for development requirement
CN115543428A (en) Simulated data generation method and device based on strategy template
CN113076086B (en) Metadata management system and method for modeling model object using the same
CN113031928B (en) Web system generation method and device, electronic equipment and computer readable storage medium
CN113849158A (en) JSON-based interface factory system, interface generation method and medium thereof
Guthrie et al. Building Cloud Apps with Microsoft Azure: Best practices for DevOps, data storage, high availability, and more

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20201202

Address after: 215100 No. 1 Guanpu Road, Guoxiang Street, Wuzhong Economic Development Zone, Suzhou City, Jiangsu Province

Applicant after: SUZHOU LANGCHAO INTELLIGENT TECHNOLOGY Co.,Ltd.

Address before: 450018 Henan province Zheng Dong New District of Zhengzhou City Xinyi Road No. 278 16 floor room 1601

Applicant before: ZHENGZHOU YUNHAI INFORMATION TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant